Upload
barney
View
44
Download
0
Tags:
Embed Size (px)
DESCRIPTION
Chapter 10. Crimes Against Property. Crimes Against Property. Arson Willful and malicious burning of a person’s property Insurance fraud is a common example Not as easy to get away with as one would think Can be a part of a hate crime Burning of churches Vandalism AKA malicious mischief - PowerPoint PPT Presentation
Citation preview
CRIMES AGAINST PROPERTY
Chapter 10
Crimes Against Property
Arson Willful and malicious burning of a person’s
property Insurance fraud is a common example Not as easy to get away with as one would think Can be a part of a hate crime
Burning of churches Vandalism
AKA malicious mischief Willful destruction of, or damage to, a property Various crimes fit in this category Extent of damage determines if the crime is a
felony or misdemeanor
Larceny
Unlawful taking and carrying away of the property of another person Two types of larceny
Petty Theft of anything small in value (i.e. less than $100.00)
Grand Theft of anything greater than $100.00 in value
Also involves keeping something that does not belong to you that can be recovered with a reasonable amount of finding the owner Find a wallet with ID in it and you keep it Receiving property that was stolen You’re driving down the road and the back of a money truck opens up.
Dollar bills proceed to fly out the back door Shoplifting
Taking items from a store without paying for them or intending to pay for them Also includes
Skipping out on a restaurant bill Not having enough money to pay a restaurant bill Filling up your gas tank and leaving without paying
Concealment is the crime of attempted shoplifting
More crimes!!!!1
Embezzlement Unlawful taking of property by someone to whom
it was entrusted Examples. . .?
Robbery Unlawful taking of property from a person’s
immediate possession by force or intimidation Involves two harms
Theft of property Actual or potential harm to the victim
Extortion or blackmail is the use of threats to obtain property of another
Pyramid Schemes
In the classic "pyramid" scheme, participants attempt to make money solely by recruiting new participants into the program
The hallmark of these schemes is the promise of sky-high returns in a short period of time for doing nothing other than handing over your money and getting others to do the same.
The fraudsters behind a pyramid scheme may go to great lengths to make the program look like a legitimate multi-level marketing program.
But despite their claims to have legitimate products or services to sell, these fraudsters simply use money coming in from new recruits to pay off early stage investors.
Eventually the pyramid will collapse. At some point the schemes get too big, the promoter cannot raise
enough money from new investors to pay earlier investors, and many people lose their money.
Other crimes of interest Forgery
A crime in which a person falsely makes or alters a writing or document with intent to defraud
Uttering is when you offer a document as real when it is truly a fake
Receiving stolen property Receiving or buying property that you know or have
reason to believe is stolen Knowledge that the property is stolen may be implied by
the circumstances Wow this is cheap You bought it from Crazy Mary’s Trunkside Depot
Unauthorized Use of a Vehicle A person takes a motor vehicle without the owner’s
consent Joyriding Auto theft Carjacking
Federal offense with implications of life in prison
HackersHackers
A person who gains illegal access to a computer system when they have no authorization to do so
Why hack? Gain classified information Steal money from financial institutions Because they can
Three types of hackers White hat hackers work for computer security
companies (AVG, McAfee, Symantec) to detect vulnerabilities in systems and fix them before they become problems
Black hat hackers break into systems to defraud, steal, or destroy networks
Grey hat hackers do a little bit of both (think Thomas Anderson from the Matrix)
The most famous hacker is Kevin Mitnick
It’s like a cold. . .but for your PC
Viruses Computer viruses are small software programs that
are designed to spread from one computer to another and to interfere with computer operation.
A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk.
Viruses are often spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail
attachments unless you know who it's from and you are expecting it.
Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files.
Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.
Melissa virus was the most famous
Malware and worms and horsies
Malware is short for malicious software and is typically used as a catch-all term to refer to any software designed to cause damage to a single computer, server, or computer network, whether it's a virus, spyware, et al.
Worms are like viruses, except they can travel through networks without being activated by the user Conficker worm
Trojan horse The Trojan Horse, at first glance will appear to be
useful software but will actually do damage once installed or run on your computer.
Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source.
Sub7 is the most famous Trojan Horse
Adware and Spyware
Spyware A type of malware that is installed on computers
and collects information about users without their knowledge.
The presence of spyware is typically hidden from the user.
A keystroke logger is an example of thisAdware
Any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used
Midaddle was a good example of this
COOKKKKIIIIEEEEE!!!!!!!! HUMM NUM NUM NUM NUM NUM
Browser cookie A plain text file (.txt) that sits on your computer in a temporary folder that
stores data about a browsing session. If you log into a website it generally sets a cookie to temporarily store your
information so you don’t have to log in every time you change a page Tracking cookie
A tracking cookie is a cookie that tracks your browsing behaviors. Marketers use this data to understand how users use their partner
websites and optimize their networks for the average user that visits their networks.
Third party cookies Third-party cookies are cookies that are set by one site, but can be read
by another site. For example, when you visit site1.com, it might set a cookie that can be
read by site2.com. Some advertisers use these types of cookies to track your visits to the
various websites on which they advertise. By themselves, cookies might not necessarily be bad, but third-party
cookies can be a lot of trouble because you may not know what the source is.
Not just a gelatinous cube of mixed meat particles
Named after the Monty Python sketchSpam is the abuse of electronic messaging systems
(including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately.
Phishing can come from Spam The act of sending an e-mail to a user falsely claiming to be
an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.
You won the lottery You need to help a foreign minister from Nigeria Mr. Song Lee from Hang Seng International Bank
Kill them with fire!!!1!
How do we prevent this from happening Hardware
Unified Threat Management device (Astaro Security Gateway) Router with a built-in firewall
Software Anti-virus, spy-ware, and malware software suites (Kaspersky,
AVG, McAfee, Symantec, Microsoft Security Essentials) You!!!!
Don’t click on links or files in e-mails Keep your operating system software fully updated Disable third-party cookies in your favorite browser STOP USING INTERNET EXPLORER 6!!! Don’t ignore threats from your PC’s anti-bad stuff software Backup your important files on a regular basis
Online with Mozy or Carbonite Microsoft offers 25GB of storage for free on their Skydrive
service External hard drive with push-button backup
. . .or
BUY A MAC!!!!!
. . . or
USE LINUX!!!!!
What do you do if you are infected with. . .
Adware or spyware AdAware, SpySweeper, or some other program can
remove the threat pretty easilyViruses or worms
Depends on the virus Some virus removal programs will remove the
threat. . .but the bad news is more often than not there is irreparable harm to the PC
Which means you might have to. . .
NUKE IT!!!!!!!!1!!DBaN
Darik’s Boot and Nuke Program that writes random ones and zeros over a hard
drive Permanently wipes your hard drive